US7969966B2 - System and method for port mapping in a communications network switch - Google Patents

System and method for port mapping in a communications network switch Download PDF

Info

Publication number
US7969966B2
US7969966B2 US11/311,716 US31171605A US7969966B2 US 7969966 B2 US7969966 B2 US 7969966B2 US 31171605 A US31171605 A US 31171605A US 7969966 B2 US7969966 B2 US 7969966B2
Authority
US
United States
Prior art keywords
ports
session
network
user
assigned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US11/311,716
Other versions
US20090180471A1 (en
Inventor
Subash Bohra
Vincent Magret
Steve Valentine
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WSOU Investments LLC
Original Assignee
Alcatel Lucent SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent SAS filed Critical Alcatel Lucent SAS
Priority to US11/311,716 priority Critical patent/US7969966B2/en
Assigned to ALCATEL reassignment ALCATEL ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BHORA, SUBASH, MAGRET, VINCENT, VALENTINE, STEVE
Priority to EP06019305A priority patent/EP1770913A1/en
Publication of US20090180471A1 publication Critical patent/US20090180471A1/en
Assigned to ALCATEL LUCENT reassignment ALCATEL LUCENT CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL
Application granted granted Critical
Publication of US7969966B2 publication Critical patent/US7969966B2/en
Assigned to WSOU INVESTMENTS, LLC reassignment WSOU INVESTMENTS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL LUCENT
Assigned to OT WSOU TERRIER HOLDINGS, LLC reassignment OT WSOU TERRIER HOLDINGS, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WSOU INVESTMENTS, LLC
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/35Switches specially adapted for specific applications
    • H04L49/354Switches specially adapted for specific applications for supporting virtual local area networks [VLAN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/65Re-configuration of fast packet switches
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/15Interconnection of switching modules
    • H04L49/1507Distribute and route fabrics, e.g. sorting-routing or Batcher-Banyan

Definitions

  • the present invention generally relates to communications networks. More particularly, and not by way of any limitation, the present invention is directed to system and method for port mapping in switches of such networks.
  • L3 Layer 3
  • ISP Internet service provider
  • LAN local area network
  • VLANs Virtual Local Area Networks
  • L2 Layer 2
  • a private VLAN is a VLAN feature in which access ports of a switch are allowed to communicate only with certain designated router ports.
  • the security implementation with a Private VLAN is conducted at the hardware layer and does not allow for any frame of any sort to pass between adjacent access ports within a Private VLAN.
  • Private VLANs provide port-based security and isolation between ports within the assigned VLAN. Data traffic on downlink ports can only be forwarded to, and from, uplink ports.
  • a deficiency of private VLANs is that they can be difficult to configure and may not provide a complete solution in some cases.
  • One embodiment is a method of implementing a port mapping technique in a switch of a communications network, wherein the switch includes a plurality of ports including user ports and network ports.
  • the method comprises identifying a first portion of the ports as user ports; identifying a second portion of the ports as network ports; assigning a plurality of the user ports to a first session; and preventing user ports assigned to the first session from interacting with one another.
  • Another embodiment is a method of implementing a port mapping technique in a switch of a communications network, wherein the switch includes a plurality of ports.
  • the method comprises identifying a first portion of the ports as user ports; identifying a second portion of the ports as network ports; assigning a plurality of the user ports to a first session; preventing user ports assigned to the first session from interacting with one another; and permitting the user ports assigned to the first session to interact with ports not assigned to the first session as long as none of the network ports is assigned to the first session.
  • Another embodiment is a system for implementing a port mapping technique in a switch of a communications network, wherein the switch includes user ports for connecting to user devices and network ports for connecting to network devices.
  • the system comprises means for assigning a plurality of the user ports to a first session; and means for preventing user ports assigned to the first session from interacting with one another.
  • FIG. 1 is a block diagram of a switch in which a port mapping technique in accordance with one embodiment is implemented
  • FIG. 2 is a block diagram of a switch in which a port mapping technique in accordance with one embodiment is implemented
  • FIG. 3 is a block diagram of a communications network in which a port mapping technique in accordance with one embodiment is implemented
  • FIG. 4 is a block diagram of a communications network in which a port mapping technique in accordance with one embodiment is implemented
  • FIG. 5 is a block diagram of a communications network in which a port mapping technique in accordance with one embodiment is implemented
  • FIG. 6 is a block diagram of a communications network in which a port mapping technique in accordance with one embodiment is implemented
  • FIG. 7 is a flowchart of the operation of a port mapping technique in accordance with one embodiment for configuring a switch.
  • FIGS. 8A and 8B illustrate port bitmap tables for respective switches of a network in which a port mapping technique in accordance with one embodiment is implemented.
  • one embodiment is a system and method for port mapping in a communications network switch.
  • the embodiments described herein distinguish between network ports (i.e., ports that connect a switch to other switches in a network) and user ports (i.e., ports to which user devices are connected to the switch) in connection with a port mapping session, identified by a session ID assigned to the port.
  • network ports i.e., ports that connect a switch to other switches in a network
  • user ports i.e., ports to which user devices are connected to the switch
  • a port mapping session identified by a session ID assigned to the port.
  • FIG. 1 when only one side (i.e., user ports) of a session is created on a switch, the user ports of that session can communicate with any other ports on the switch, but not with each other. This situation is illustrated in FIG. 1 . In particular, as shown in FIG.
  • Session 1 user ports 102 are ports 1 - 2 .
  • Session 2 user ports 104 are ports 3 - 4 .
  • the remaining ports 5 - 26 are general ports 106 . Because no network ports have been created for either Session 1 or Session 2 , the Session 1 user ports 102 can communicate with the Session 2 user ports 104 and the general ports 106 on the switch 100 . Similarly, the Session 2 user ports 104 can communicate with the Session 1 user ports 102 and the general port 106 on the switch 100 .
  • Session 1 user ports 102 cannot communicate with one another; similarly, the Session 2 user ports 104 (ports 3 and 4 ) cannot communicate with one another.
  • the general ports 106 are not similarly restricted and can communicate with one another.
  • Session 1 and Session 2 are created on a switch 200 .
  • Session 1 user ports 202 are ports 1 - 2 .
  • Session 1 network ports 204 are ports 25 - 26 .
  • Session 2 user ports 206 are ports 3 - 4 .
  • the remaining ports 5 - 24 are general ports 208 . Because network ports 204 have been created for Session 1 , the Session 1 user ports 202 can communicate only with the Session 1 network ports 204 . In contrast, the Session 2 user ports 206 can communicate with the Session 1 network ports 204 and with the general ports 208 on the switch 200 .
  • Session 1 user ports 202 cannot communicate with one another; similarly, the Session 2 user ports 206 (ports 3 and 4 ) cannot communicate with one another.
  • the network ports 204 and the general ports 208 are not similarly restricted and can communicate with one another.
  • FIG. 3 illustrates a port mapping among four switches S 1 -S 4 in a network 100 in accordance with one embodiment.
  • the switch S 1 has a plurality of user ports A, B, and M 1 -M 3 , as well as a plurality of network ports N 1 -N 3 .
  • the switch S 2 has user ports C, D, and Y, and a network port N 4 .
  • the switch S 3 has user ports E, F, and X and a network port N 5
  • the switch S 4 has user ports G, H, and Z, and a network port N 7 . It will be assumed for the sake of example, that the following port mapping sessions have been configured on the network 100 as illustrated in FIG. 3 .
  • network ports N 1 , N 2 , and N 3 are made part of both of the sessions on the switch S 1 (i.e., sessions 1 and 2 ), which is configurable, then the ports N 1 , N 2 , and N 3 will be able to interact with each other and the user ports C, D and Y on the switch S 2 will be able to interact with all of the user ports on the switches S 1 , S 3 , and S 4 .
  • FIG. 7 is a flowchart of the operation of the embodiments described herein for configuring a switch for implementation of port mapping using network and user ports.
  • a network administrator identifies all user ports on the switch that should not be permitted to interact with any other user port on the switch and assigns a first session ID to those user ports.
  • the network administrator identifies network ports with which the user ports identified in step 700 are permitted to interact and assigns the first session ID to those network ports.
  • the only ports on the switch with which the user ports identified in step 700 are able to interact are the network ports identified in step 702 .
  • step 704 the network administrator identifies user ports on the switch that should not be permitted to interact with one another and assigns a second session ID to those user ports. Step 704 may be repeated for any number of groups of user ports that are not to be permitted to interact with one another, but are permitted to interact with user ports of other sessions, general ports, and network ports.
  • the rules are implemented by establishing the allowed ports by bitmap tables within generally available application specific integrated circuits (“ASICs”) in the switches.
  • ASICs application specific integrated circuits
  • the configuration is managed so that the desired behavior is attained. For example, on one ASIC, when a packet is received at a port, the switch decides to which port to transmit the packet.
  • the corresponding entry in the port bitmap table that allows for transmit is set to zero for restricted ports and to one for allowed ports.
  • FIGS. 8A and 8B illustrate exemplary bitmap tables for the ports of the switches S 1 and S 4 , respectively, of FIG. 3 when those switches are configured as illustrated in that figure.
  • a one in an entry indicates that interaction is allowed between the corresponding ports; a zero indicates that interaction is not allowed.
  • FIG. 8A interaction is not allowed between user ports A and B, as indicated by a zero in the corresponding entries for those ports, while interaction is allowed between user port A and network port N 1 , as indicated by a one in the corresponding entries for those ports.

Abstract

System and method for implementing a port mapping technique in a switch of a communications network, wherein the switch includes a plurality of ports including user ports and network ports, are described. In one embodiment, the method comprises identifying a first portion of the ports as user ports; identifying a second portion of the ports as network ports; assigning a plurality of the user ports to a first session; and preventing user ports assigned to the first session from interacting with one another.

Description

PRIORITY UNDER 35 U.S.C. §119(e) & 37 C.F.R. §1.78
This nonprovisional application claims priority based upon the following prior United States provisional patent application entitled: “PORT MAPPING WITH USER/NETWORK PORTS,” Application No. 60/721,670, filed on Sep. 29, 2005, in the names of: Subash Bohra, Vincent Magret, and Steve Valentine which is hereby incorporated by reference.
BACKGROUND OF THE INVENTION
1. Technical Field of the Invention
The present invention generally relates to communications networks. More particularly, and not by way of any limitation, the present invention is directed to system and method for port mapping in switches of such networks.
2. Description of Related Art
In the past, it has been common communications network engineering practice to separate traffic belonging to different users using a router, which is a Layer 3 (“L3”) device by assigning each user to a different subnet identified by a unique L3 address. The router would then transmit each user's packets out through a port assigned to the user's subnet. In view of the fact that only a limited number of bits in the L3 address are used for the subnet mask, the number of subnets that may be addressed by a single router is limited.
It will be recognized that in a communications network, there are many users of the network who require that their traffic be kept absolutely separate from the traffic of other users. For example, an Internet service provider (“ISP”) will typically have many customers who want to connect to a server farm. Access to the ISP is through a router connected to a common external computer network, such as the Internet. This router must route each customer's traffic to that customer's local area network (“LAN”) in such a manner as to maintain security and privacy between the data of different customers. It is imperative that the ISP prevent traffic originating from one customer's server from being received by another customer's server. As previously indicated, a limitation in the use of subnets in this scenario is that there is only a limited number of subnets which can be defined from standard Layer 3 addresses. In modern computer network systems, this numerical limitation severely restricts the number of individual users that can be serviced and also have their data traffic maintained separately. Further, the management of a large number of subnets by a network manager quickly becomes burdensome, especially in the event that the network has thousands of customers whose packet traffic must be kept separate.
Another means by which users traffic may be kept separate is through use private Virtual Local Area Networks (VLANs) defined within a network switch, or bridge, which is a Layer 2 (“L2”) device. A private VLAN is a VLAN feature in which access ports of a switch are allowed to communicate only with certain designated router ports. The security implementation with a Private VLAN is conducted at the hardware layer and does not allow for any frame of any sort to pass between adjacent access ports within a Private VLAN. Private VLANs provide port-based security and isolation between ports within the assigned VLAN. Data traffic on downlink ports can only be forwarded to, and from, uplink ports. A deficiency of private VLANs is that they can be difficult to configure and may not provide a complete solution in some cases.
SUMMARY OF THE INVENTION
One embodiment is a method of implementing a port mapping technique in a switch of a communications network, wherein the switch includes a plurality of ports including user ports and network ports. The method comprises identifying a first portion of the ports as user ports; identifying a second portion of the ports as network ports; assigning a plurality of the user ports to a first session; and preventing user ports assigned to the first session from interacting with one another.
Another embodiment is a method of implementing a port mapping technique in a switch of a communications network, wherein the switch includes a plurality of ports. The method comprises identifying a first portion of the ports as user ports; identifying a second portion of the ports as network ports; assigning a plurality of the user ports to a first session; preventing user ports assigned to the first session from interacting with one another; and permitting the user ports assigned to the first session to interact with ports not assigned to the first session as long as none of the network ports is assigned to the first session.
Another embodiment is a system for implementing a port mapping technique in a switch of a communications network, wherein the switch includes user ports for connecting to user devices and network ports for connecting to network devices. The system comprises means for assigning a plurality of the user ports to a first session; and means for preventing user ports assigned to the first session from interacting with one another.
BRIEF DESCRIPTION OF THE DRAWINGS
A more complete understanding of the present invention may be had by reference to the following Detailed Description when taken in conjunction with the accompanying drawings wherein:
FIG. 1 is a block diagram of a switch in which a port mapping technique in accordance with one embodiment is implemented;
FIG. 2 is a block diagram of a switch in which a port mapping technique in accordance with one embodiment is implemented;
FIG. 3 is a block diagram of a communications network in which a port mapping technique in accordance with one embodiment is implemented;
FIG. 4 is a block diagram of a communications network in which a port mapping technique in accordance with one embodiment is implemented;
FIG. 5 is a block diagram of a communications network in which a port mapping technique in accordance with one embodiment is implemented;
FIG. 6 is a block diagram of a communications network in which a port mapping technique in accordance with one embodiment is implemented;
FIG. 7 is a flowchart of the operation of a port mapping technique in accordance with one embodiment for configuring a switch; and
FIGS. 8A and 8B illustrate port bitmap tables for respective switches of a network in which a port mapping technique in accordance with one embodiment is implemented.
DETAILED DESCRIPTION OF THE DRAWINGS
Embodiments of the invention will now be described with reference to various examples of how the invention can best be made and used. Like reference numerals are used throughout the description and several views of the drawings to indicate like or corresponding parts, wherein the various elements are not necessarily drawn to scale.
As will be described in detail hereinbelow, one embodiment is a system and method for port mapping in a communications network switch. In particular, the embodiments described herein distinguish between network ports (i.e., ports that connect a switch to other switches in a network) and user ports (i.e., ports to which user devices are connected to the switch) in connection with a port mapping session, identified by a session ID assigned to the port. In general, when only one side (i.e., user ports) of a session is created on a switch, the user ports of that session can communicate with any other ports on the switch, but not with each other. This situation is illustrated in FIG. 1. In particular, as shown in FIG. 1, two sessions (Session 1 and Session 2) are created on a switch 100. Session 1 user ports 102 are ports 1-2. Session 2 user ports 104 are ports 3-4. The remaining ports 5-26 are general ports 106. Because no network ports have been created for either Session 1 or Session 2, the Session 1 user ports 102 can communicate with the Session 2 user ports 104 and the general ports 106 on the switch 100. Similarly, the Session 2 user ports 104 can communicate with the Session 1 user ports 102 and the general port 106 on the switch 100. However, the Session 1 user ports 102 (ports 1 and 2) cannot communicate with one another; similarly, the Session 2 user ports 104 (ports 3 and 4) cannot communicate with one another. The general ports 106 (ports 5-26), on the other hand, are not similarly restricted and can communicate with one another.
When two sides (i.e., user ports and network ports) of a session are created on a single switch, the user ports in the session can communicate only with the network ports in the same session and with no other ports on the switch. The session thus forms a closed entity on the switch with respect to the user ports. This situation is illustrated in FIG. 2.
In particular, as shown in FIG. 2, two sessions (Session 1 and Session 2) are created on a switch 200. Session 1 user ports 202 are ports 1-2. Session 1 network ports 204 are ports 25-26. Session 2 user ports 206 are ports 3-4. The remaining ports 5-24 are general ports 208. Because network ports 204 have been created for Session 1, the Session 1 user ports 202 can communicate only with the Session 1 network ports 204. In contrast, the Session 2 user ports 206 can communicate with the Session 1 network ports 204 and with the general ports 208 on the switch 200. Once again, however, the Session 1 user ports 202 (ports 1 and 2) cannot communicate with one another; similarly, the Session 2 user ports 206 (ports 3 and 4) cannot communicate with one another. The network ports 204 and the general ports 208 (ports 5-26), on the other hand, are not similarly restricted and can communicate with one another.
In general, for user and network ports, the following rules are applied by the embodiments described herein for implementing port mapping using network and user ports.
    • 1. A port mapping session comprises a session ID, a set of user ports, and/or a set of network ports.
    • 2. A port mapping session can be configured with or without user ports and network ports.
    • 3. User ports with a common session ID cannot communicate with each other.
    • 4. A user port can be part of only one port mapping session at any time.
    • 5. A user port cannot be a network port and vice versa.
    • 6. If a set of network ports of a given session is non-empty, then any user ports of the same session can only communicate with members of that set of network ports.
    • 7. If a session is configured as “bidirectional”, the network ports of that session cannot communicate with other network ports of the same session.
      The “closure” referred to above is primarily provided by rule 6, which prevents user ports from communicating with other ports in the system.
Application of the above-listed rules will now be illustrated in greater detail with reference to FIGS. 3-4. In particular, FIG. 3 illustrates a port mapping among four switches S1-S4 in a network 100 in accordance with one embodiment. The switch S1 has a plurality of user ports A, B, and M1-M3, as well as a plurality of network ports N1-N3. Similarly, the switch S2 has user ports C, D, and Y, and a network port N4. The switch S3 has user ports E, F, and X and a network port N5, and the switch S4 has user ports G, H, and Z, and a network port N7. It will be assumed for the sake of example, that the following port mapping sessions have been configured on the network 100 as illustrated in FIG. 3.
On Switch S1:
    • Port Mapping Session 1 (Session ID=1): ports A and B are user ports; ports N1 and N2 are network ports configured in bidirectional mode
    • Port Mapping Session 2 (Session ID=2): ports M1, M2, and M3 are user ports, port N3 is a network port
      On Switch S2:
    • Port Mapping Session 1 (Session ID=1): ports G and H are user ports, port N7 is a network port
Based on the configuration shown in FIG. 3 and described above, the following is attained:
    • 1. User ports A and B cannot interact with one another (because they have the same session ID);
    • 2. User ports A and B cannot interact with ports on the switch S2 (because they can only communicate with network ports N1 (to switch S3) and N2 (to switch S4);
    • 3. User ports C, D, and Y can interact with all user ports on the network except user ports A and B on the switch S1 (for the same reasons as set forth above);
    • 4. User ports G and H cannot interact with each other (because they have the same session ID);
    • 5. User ports G and H can interact with all the user ports on the switch S1 except user ports M1, M2, and M3, but cannot interact with any port on the switch S3 (network port N7 (switch S4) is connected to network port N2 (switch S1), which is session ID 1 and therefore communicates with user ports A and B, but not M1, M2, and M3; network ports N1 and N2 cannot communicate with one another due to bidirectional session); and
    • 6. User ports E, F, and X can interact with all of the user ports on the switch S1 except the user ports M1, M2, and M3, but cannot interact with any port on the switch S4 (same reason as above).
Referring now to FIG. 4, it will be assumed for the sake of example, that the following port mapping sessions have been configured on the network 100 as illustrated in FIG. 4.
On Switch S1
    • Port Mapping Session 1 (Session ID=1): ports A and B are user ports; ports N1 and N2 are network ports configured in unidirectional mode.
    • Port Mapping Session 2 (Session ID=2): ports M1, M2, and M3 are user ports; port N3 is a network port.
      On Switch S4
    • Port Mapping Session 1 (Session ID=1): ports G and H are user ports, port N7 is a network port.
Based on the foregoing configuration illustrated in FIG. 4 and described above, the following is attained:
    • 1. User ports A and B cannot interact with one another (because they have the same session ID);
    • 2. User ports A and B cannot interact with ports on the switch S2 (because they can only communicate with network ports N1 (to switch S3) and N2 (to switch S4);
    • 3. User ports C, D, and Y can interact with all user ports on the network except user ports A and B on the switch S1 (for the same reasons as set forth above);
    • 4. User ports G and H cannot interact with each other (because they have the same session ID);
    • 5. User ports G and H can interact with all the user ports on the switch S1 except user ports M1, M2, and M3 (network port N7 (switch S4) is connected to network port N2 (switch S1), which is session ID 1 and therefore communicates with user ports A and B, but not M1, M2, and M3) and can interact with any port on switch S2 or switch S3 (network ports N1 and N2 can communicate with each other due to unidirectional session); and
    • 6. User ports E, F, and X can interact with all of the user ports on the switch S1 except the user ports M1, M2, and M3 and can interact with any port on the switch S2 or the switch S3 (same reason as above).
It will be recognized that if network ports N1, N2, and N3 are made part of both of the sessions on the switch S1 (i.e., sessions 1 and 2), which is configurable, then the ports N1, N2, and N3 will be able to interact with each other and the user ports C, D and Y on the switch S2 will be able to interact with all of the user ports on the switches S1, S3, and S4.
Referring now to FIG. 5, it will be assumed for the sake of example, that the following port mapping sessions have been configured on the network 100 as illustrated in FIG. 5.
On Switch 1:
    • Port Mapping Session 1 (Session ID=1): ports N1 and N2 are network ports configured in bidirectional mode.
    • Port Mapping Session 2 (Session ID=2): port N3 is a network port.
      On Switch 4:
    • Port Mapping Session 1 (Session ID=1): ports G and H are user ports.
Based on the foregoing, the following situation is attained:
    • 1. User ports A, B, M1, M2, and M3 can interact with one another (all are general ports with no session ID);
    • 2. The only restriction on the switch S1 is that network ports N1 and N2 cannot interact with one another (bidirectional session), thus restricting switches S3 and S4 from communicating with one another;
    • 3. User ports G and H on switch S4 cannot interact with one another (ports G and H have the same session ID) and cannot interact with ports on the switch S3 (due to inability of network ports N1 and N2 to interact with one another).
Referring now to FIG. 6, it will be assumed for the sake of example, that the following port mapping sessions have been configured on the network 100 as illustrated in FIG. 6.
On Switch S1:
    • Port Mapping Session 1 (Session ID=1): ports A and B are user ports.
    • Port Mapping Session 2 (Session ID=2): ports M1, M2, and M3 are user ports.
      On Switch S4:
    • Port Mapping Session 1 (Session ID=1): ports G and H are user ports.
Based on the forgoing, the following situation is attained:
    • 1. User ports A and B cannot interact with one another (same session ID).
    • 2. User ports M1, M2, and M3 cannot interact with one another (same session ID).
    • 3. User port A can interact with user ports M1, M2, and M3, and vice versa (different session IDs and no network port assigned to session).
    • 4. User port B can interact with user ports M1, M2, and M3, and vice versa (same as above).
    • 5. User ports G and H cannot interact with one another (same session ID).
FIG. 7 is a flowchart of the operation of the embodiments described herein for configuring a switch for implementation of port mapping using network and user ports. In step 700, a network administrator identifies all user ports on the switch that should not be permitted to interact with any other user port on the switch and assigns a first session ID to those user ports. In step 702, the network administrator identifies network ports with which the user ports identified in step 700 are permitted to interact and assigns the first session ID to those network ports. As a result, the only ports on the switch with which the user ports identified in step 700 are able to interact are the network ports identified in step 702.
In step 704, the network administrator identifies user ports on the switch that should not be permitted to interact with one another and assigns a second session ID to those user ports. Step 704 may be repeated for any number of groups of user ports that are not to be permitted to interact with one another, but are permitted to interact with user ports of other sessions, general ports, and network ports.
In one embodiment, the rules are implemented by establishing the allowed ports by bitmap tables within generally available application specific integrated circuits (“ASICs”) in the switches. The configuration is managed so that the desired behavior is attained. For example, on one ASIC, when a packet is received at a port, the switch decides to which port to transmit the packet. In one embodiment, the corresponding entry in the port bitmap table that allows for transmit is set to zero for restricted ports and to one for allowed ports.
FIGS. 8A and 8B illustrate exemplary bitmap tables for the ports of the switches S1 and S4, respectively, of FIG. 3 when those switches are configured as illustrated in that figure. A one in an entry indicates that interaction is allowed between the corresponding ports; a zero indicates that interaction is not allowed. For example, as illustrated in FIG. 8A, interaction is not allowed between user ports A and B, as indicated by a zero in the corresponding entries for those ports, while interaction is allowed between user port A and network port N1, as indicated by a one in the corresponding entries for those ports.
It is believed that the operation and construction of the present invention will be apparent from the Detailed Description set forth above. While the exemplary embodiments of the invention shown and described have been characterized as being preferred, it should be readily understood that various changes and modifications could be made therein without departing from the scope of the present invention as set forth in the following claims.

Claims (22)

1. A method of implementing a port mapping technique in a switch of a communications network, the switch comprising a plurality of ports including user ports and network ports, the user ports for connecting to user devices and the network ports for connecting to network devices, the method comprising:
identifying a first portion of the ports as user ports;
identifying a second portion of the ports as network ports;
assigning a plurality of the user ports to a first session and a second session;
assigning a plurality of the network ports to the first session, the second session;
preventing user ports assigned to the first session from interacting with one another and network ports other than the network port assigned to the first session;
preventing the network ports assigned to the second session from interacting with one another; and
permitting the user ports assigned to the first session to interact with ports not assigned to the first session.
2. The method of claim 1 further comprising assigning none of the network ports to the first session.
3. The method of claim 1 further comprising:
assigning one of the network ports to the first session.
4. The method of claim 1 further comprising:
permitting the user ports assigned to the first session to interact with ports not assigned to the first session as long as none of the network ports is assigned to the first session.
5. The method of claim 1 wherein the first session is a unidirectional session, the method further comprising permitting the network ports assigned to the first session to interact with one another.
6. The method of claim 1 wherein the first session is a bidirectional session, the method further comprising preventing the network ports assigned to the first session from interacting with one another.
7. The method of claim 1 wherein the preventing user ports assigned to the same session from interacting with one another comprises preventing a packet received by the switch at a first one of the user ports assigned to a session from being transmitted from the switch via a second one of the user ports assigned to the same session.
8. The method of claim 1 wherein the user ports are connectable to user devices.
9. The method of claim 1 wherein the network ports are connectable to other switches in the communications network.
10. A method of implementing a port mapping technique in a switch of a communications network, the switch comprising a plurality of user ports for connecting to user devices and network ports for connecting to network devices, the method comprising:
identifying a first portion of the ports as user ports;
identifying a second portion of the ports as network ports;
assigning a plurality of the user ports, a plurality of the network ports to a first session;
preventing user ports assigned to the first session from interacting with one another and network ports other than the network port assigned to the first session;
permitting the user ports assigned to the first session to interact with ports not assigned to the first session as long as none of the network ports is assigned to the first session; and
permitting the network ports assigned to the first session to interact with one another.
11. The method of claim 10 further comprising:
assigning one of the network ports to the first session.
12. The method of claim 10 wherein the first session is a unidirectional session.
13. The method of claim 10 wherein the first session is a bidirectional session, the method further comprising preventing the network ports assigned to the first session from interacting with one another.
14. A system for implementing a port mapping technique in a switch of a communications network, the switch comprising user ports for connecting to user devices and network ports for connecting to network devices, the system comprising:
means for assigning a plurality of the user ports, a plurality of the network ports to a first session;
means for preventing user ports assigned to the first session from interacting with one another;
means for permitting the user ports assigned to the first session to interact with user ports and network ports that are not assigned to the first session as long as none of the network ports is assigned to the first session; and
means for permitting the network ports assigned to the first session to interact with one another.
15. The system of claim 14 further comprising means for assigning none of the network oils to the first session.
16. The system of claim 14 wherein the means for preventing and means for permitting comprise entries in a bitmap table for the switch.
17. The system of claim 14 further comprising:
means for assigning one of the network ports to the first session; and
means for preventing the user ports assigned to the first session from interacting with network ports other than the network port assigned to the first session.
18. The system of claim 14 further comprising:
means for assigning a plurality of the user ports to a second session; and
means for preventing the user ports assigned to the second session from communicating with one another.
19. The system of claim 14 wherein the first session is a unidirectional session.
20. The system of claim 14 wherein the first session is a bidirectional session, the system further comprising means for preventing the network ports assigned to the first session from interacting with one another.
21. The system of claim 14 wherein the means for preventing user ports assigned to the same session from interacting with one another comprises means for preventing a packet received by the switch at a first one of the user ports assigned to a session from being transmitted from the switch via a second one of the user ports assigned to the same session.
22. The system of claim 14 wherein the means for preventing comprises an entry in a bitmap table for the switch.
US11/311,716 2005-09-29 2005-12-19 System and method for port mapping in a communications network switch Expired - Fee Related US7969966B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/311,716 US7969966B2 (en) 2005-12-19 2005-12-19 System and method for port mapping in a communications network switch
EP06019305A EP1770913A1 (en) 2005-09-29 2006-09-15 System and method for port mapping in a communications network switch

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/311,716 US7969966B2 (en) 2005-12-19 2005-12-19 System and method for port mapping in a communications network switch

Publications (2)

Publication Number Publication Date
US20090180471A1 US20090180471A1 (en) 2009-07-16
US7969966B2 true US7969966B2 (en) 2011-06-28

Family

ID=40850564

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/311,716 Expired - Fee Related US7969966B2 (en) 2005-09-29 2005-12-19 System and method for port mapping in a communications network switch

Country Status (1)

Country Link
US (1) US7969966B2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012014509A1 (en) * 2010-07-30 2012-02-02 株式会社サイバー・ソリューションズ Unauthorized access blocking control method

Citations (83)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4387458A (en) * 1981-05-28 1983-06-07 Bell Telephone Laboratories, Incorporated High capacity secure address loop network
US5305311A (en) * 1992-05-20 1994-04-19 Xerox Corporation Copy network providing multicast capabilities in a broadband ISDN fast packet switch suitable for use in a local area network
US5319644A (en) 1992-08-21 1994-06-07 Synoptics Communications, Inc. Method and apparatus for identifying port/station relationships in a network
US5489896A (en) * 1992-10-18 1996-02-06 Lannet Data Communications Ltd. Network with a security capability
US5541928A (en) 1993-11-02 1996-07-30 Nippondenso Co., Ltd. Communication system which establishes communication sessions based on unit ID codes to avoid transmission conflicts
US5627824A (en) * 1993-01-08 1997-05-06 Gpt Limited Telecommunications network
US5633869A (en) * 1992-09-14 1997-05-27 Network Equipment Technologies, Inc. Virtual network using asynchronous transfer mode
WO1997036407A1 (en) * 1996-03-25 1997-10-02 I-Cube, Inc. Hierarchical address translation system for a network switch
US5781549A (en) * 1996-02-23 1998-07-14 Allied Telesyn International Corp. Method and apparatus for switching data packets in a data network
US5805801A (en) * 1997-01-09 1998-09-08 International Business Machines Corporation System and method for detecting and preventing security
US5822309A (en) * 1995-06-15 1998-10-13 Lucent Technologies Inc. Signaling and control architecture for an ad-hoc ATM LAN
US5825772A (en) * 1995-11-15 1998-10-20 Cabletron Systems, Inc. Distributed connection-oriented services for switched communications networks
US5941979A (en) 1991-07-08 1999-08-24 Seiko Epson Corporation Microprocessor architecture with a switch network and an arbitration unit for controlling access to memory ports
US6009092A (en) * 1996-12-24 1999-12-28 International Business Machines Corporation LAN switch architecture
US6021495A (en) * 1996-12-13 2000-02-01 3Com Corporation Method and apparatus for authentication process of a star or hub network connection ports by detecting interruption in link beat
US6026078A (en) 1997-02-05 2000-02-15 Nortel Networks Corporation Apparatus and method for providing multiple network port configurations
US6084856A (en) * 1997-12-18 2000-07-04 Advanced Micro Devices, Inc. Method and apparatus for adjusting overflow buffers and flow control watermark levels
US6229538B1 (en) 1998-09-11 2001-05-08 Compaq Computer Corporation Port-centric graphic representations of network controllers
US6304973B1 (en) * 1998-08-06 2001-10-16 Cryptek Secure Communications, Llc Multi-level security network system
US6331983B1 (en) * 1997-05-06 2001-12-18 Enterasys Networks, Inc. Multicast switching
US6363081B1 (en) 1998-03-04 2002-03-26 Hewlett-Packard Company System and method for sharing a network port among multiple applications
US6381218B1 (en) * 1998-09-11 2002-04-30 Compaq Computer Corporation Network controller system that uses directed heartbeat packets
US6421735B1 (en) 1998-10-30 2002-07-16 Advanced Micro Devices, Inc. Apparatus and method for automatically selecting a network port for a home network station
US6421342B1 (en) * 1998-07-02 2002-07-16 Pluris, Inc. Packet forwarding apparatus and method using pipelined node address processing
US6430626B1 (en) 1996-12-30 2002-08-06 Compaq Computer Corporation Network switch with a multiple bus structure and a bridge interface for transferring network data between different buses
US6438132B1 (en) * 1998-10-14 2002-08-20 Nortel Networks Limited Virtual port scheduler
US6453371B1 (en) 1999-04-23 2002-09-17 Palm, Inc. Method, apparatus, and system for selection of a port for data exchange
US6466583B1 (en) * 1996-07-15 2002-10-15 Telia Ab Integration of SNMP and CMIP
US20020191589A1 (en) * 2001-04-27 2002-12-19 Dimitrios Vassiliou Method for synchronizing call signaling and voice circuit setup over a voice over internet protocol network
US6519051B1 (en) * 2000-03-06 2003-02-11 Shinestar Llc Fax through data network and remote access network appliance control apparatus and method
US6564261B1 (en) 1999-05-10 2003-05-13 Telefonaktiebolaget Lm Ericsson (Publ) Distributed system to intelligently establish sessions between anonymous users over various networks
US20030142674A1 (en) * 2002-01-30 2003-07-31 Nortel Networks Limited Label control method and apparatus for virtual private LAN segment networks
US20030206523A1 (en) * 2001-08-24 2003-11-06 Wei Lu Network application association
US6647018B1 (en) 1997-12-17 2003-11-11 Nokia Corporation Method for implementing ISDN user port status monitoring
US20030227904A1 (en) * 2002-06-06 2003-12-11 Adc Telecommunications Israel Ltd. Associating virtual channel identifier to a user phone number at an access node in a VoATM telecommunication system
US20040062257A1 (en) * 2002-09-30 2004-04-01 Intel Corporation System and method of maintaining coherent and synchronized address tables on all switches in a software stacking configuration
US6741592B1 (en) 2000-05-22 2004-05-25 Cisco Technology, Inc. Private VLANs
US6766373B1 (en) 2000-05-31 2004-07-20 International Business Machines Corporation Dynamic, seamless switching of a network session from one connection route to another
US20040210663A1 (en) * 2003-04-15 2004-10-21 Paul Phillips Object-aware transport-layer network processing engine
US6810041B2 (en) 2001-07-13 2004-10-26 Adc Dsl Systems, Inc. Integrated access device
US20040218539A1 (en) * 2003-03-26 2004-11-04 Usama Anqud Managing loops between network devices by monitoring MAC moves
US20040243710A1 (en) * 2001-08-03 2004-12-02 Xiaolei Mao Method of user data exchange in the data network and a data network
US20040268140A1 (en) 2003-06-26 2004-12-30 Zimmer Vincent J. Method and system to support network port authentication from out-of-band firmware
US6839747B1 (en) * 1998-06-30 2005-01-04 Emc Corporation User interface for managing storage in a storage system coupled to a network
US20050010811A1 (en) 2003-06-16 2005-01-13 Zimmer Vincent J. Method and system to support network port authentication from out-of-band firmware
US6850542B2 (en) * 2000-11-14 2005-02-01 Broadcom Corporation Linked network switch configuration
US20050041596A1 (en) 2003-07-07 2005-02-24 Matsushita Electric Industrial Co., Ltd. Relay device and server, and port forward setting method
US20050058118A1 (en) 2003-09-15 2005-03-17 Davis Lawrence D. Method and apparatus for forwarding packets in an ethernet passive optical network
US20050078171A1 (en) * 2003-10-08 2005-04-14 Cisco Technology, Inc. A California Corporation System and method for performing distributed video conferencing
US20050091387A1 (en) * 2003-09-26 2005-04-28 Nec Corporation Network switch for logical isolation between user network and server unit management network and its operating method
US6892309B2 (en) 2002-02-08 2005-05-10 Enterasys Networks, Inc. Controlling usage of network resources by a user at the user's entry point to a communications network based on an identity of the user
US6907036B1 (en) * 1999-06-28 2005-06-14 Broadcom Corporation Network switch enhancements directed to processing of internal operations in the network switch
US20050169315A1 (en) * 2004-01-20 2005-08-04 Sbc Knowledge Ventures, L.P. System and method for accessing digital subscriber line data
US20050190788A1 (en) * 2004-02-27 2005-09-01 Wong Yu-Man M. System and method for VLAN multiplexing
US6952401B1 (en) * 1999-03-17 2005-10-04 Broadcom Corporation Method for load balancing in a network switch
US6956824B2 (en) * 2001-06-14 2005-10-18 Tropic Networks Inc. Extension of link aggregation protocols over the network
US20050232285A1 (en) * 2001-10-18 2005-10-20 Terrell William C System and method of providing network node services
US20050232254A1 (en) * 2002-07-05 2005-10-20 Ulrich Korner Filter for traffic separation
US7031302B1 (en) * 1999-05-21 2006-04-18 Broadcom Corporation High-speed stats gathering in a network switch
US7031297B1 (en) * 2000-06-15 2006-04-18 Avaya Communication Israel Ltd. Policy enforcement switching
US7035286B2 (en) * 2000-11-14 2006-04-25 Broadcom Corporation Linked network switch configuration
US7035255B2 (en) * 2000-11-14 2006-04-25 Broadcom Corporation Linked network switch configuration
US20060107108A1 (en) * 2001-04-20 2006-05-18 Egenera, Inc. Service clusters and method in a processing system with failover capability
US7082133B1 (en) * 1999-09-03 2006-07-25 Broadcom Corporation Apparatus and method for enabling voice over IP support for a network switch
US20060182118A1 (en) * 2005-02-01 2006-08-17 Hong Kong Applied Science and Technology Research Institute Company Limited System And Method For Efficient Traffic Processing
US20060272014A1 (en) * 2005-05-26 2006-11-30 Mcrae Matthew B Gateway notification to client devices
US20070002899A1 (en) * 2005-06-30 2007-01-04 Anant Raman Methodology for network port security
US20070014290A1 (en) * 2005-07-12 2007-01-18 Cisco Technology, Inc. Address resolution mechanism for ethernet maintenance endpoints
US7171504B2 (en) * 2001-10-03 2007-01-30 Fujitsu Limited Transmission unit
US7174390B2 (en) * 2001-04-20 2007-02-06 Egenera, Inc. Address resolution protocol system and method in a virtual network
EP1770913A1 (en) * 2005-09-29 2007-04-04 Alcatel Lucent System and method for port mapping in a communications network switch
US7216161B1 (en) * 2001-11-08 2007-05-08 Cisco Technology, Inc. Maintaining internet access while moving from port to port
US7231430B2 (en) * 2001-04-20 2007-06-12 Egenera, Inc. Reconfigurable, virtual processing system, cluster, network and method
US7290283B2 (en) * 2001-01-31 2007-10-30 Lancope, Inc. Network port profiling
US7310664B1 (en) * 2004-02-06 2007-12-18 Extreme Networks Unified, configurable, adaptive, network architecture
US7380025B1 (en) * 2003-10-07 2008-05-27 Cisco Technology, Inc. Method and apparatus providing role-based configuration of a port of a network element
US7394756B1 (en) * 2003-03-17 2008-07-01 Sprint Communications Company L.P. Secure hidden route in a data network
US7424012B2 (en) * 2000-11-14 2008-09-09 Broadcom Corporation Linked network switch configuration
US7460488B2 (en) * 2003-04-15 2008-12-02 Thomson Licensing Method and apparatus for router port configuration
US7469298B2 (en) * 2001-08-15 2008-12-23 Fujitsu Limited Method and system for enabling layer 2 transmission of IP data frame between user terminal and service provider
US7516487B1 (en) * 2003-05-21 2009-04-07 Foundry Networks, Inc. System and method for source IP anti-spoofing security
US7747836B2 (en) * 2005-03-08 2010-06-29 Netapp, Inc. Integrated storage virtualization and switch system
US7783735B1 (en) * 2004-03-22 2010-08-24 Mcafee, Inc. Containment of network communication

Patent Citations (95)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4387458A (en) * 1981-05-28 1983-06-07 Bell Telephone Laboratories, Incorporated High capacity secure address loop network
US5941979A (en) 1991-07-08 1999-08-24 Seiko Epson Corporation Microprocessor architecture with a switch network and an arbitration unit for controlling access to memory ports
US5305311A (en) * 1992-05-20 1994-04-19 Xerox Corporation Copy network providing multicast capabilities in a broadband ISDN fast packet switch suitable for use in a local area network
US5319644A (en) 1992-08-21 1994-06-07 Synoptics Communications, Inc. Method and apparatus for identifying port/station relationships in a network
US5633869A (en) * 1992-09-14 1997-05-27 Network Equipment Technologies, Inc. Virtual network using asynchronous transfer mode
US5489896A (en) * 1992-10-18 1996-02-06 Lannet Data Communications Ltd. Network with a security capability
US5627824A (en) * 1993-01-08 1997-05-06 Gpt Limited Telecommunications network
US5541928A (en) 1993-11-02 1996-07-30 Nippondenso Co., Ltd. Communication system which establishes communication sessions based on unit ID codes to avoid transmission conflicts
US5822309A (en) * 1995-06-15 1998-10-13 Lucent Technologies Inc. Signaling and control architecture for an ad-hoc ATM LAN
US5825772A (en) * 1995-11-15 1998-10-20 Cabletron Systems, Inc. Distributed connection-oriented services for switched communications networks
US20050083949A1 (en) * 1995-11-15 2005-04-21 Kurt Dobbins Distributed connection-oriented services for switched communication networks
US5781549A (en) * 1996-02-23 1998-07-14 Allied Telesyn International Corp. Method and apparatus for switching data packets in a data network
WO1997036407A1 (en) * 1996-03-25 1997-10-02 I-Cube, Inc. Hierarchical address translation system for a network switch
US6466583B1 (en) * 1996-07-15 2002-10-15 Telia Ab Integration of SNMP and CMIP
US6021495A (en) * 1996-12-13 2000-02-01 3Com Corporation Method and apparatus for authentication process of a star or hub network connection ports by detecting interruption in link beat
US6009092A (en) * 1996-12-24 1999-12-28 International Business Machines Corporation LAN switch architecture
US6430626B1 (en) 1996-12-30 2002-08-06 Compaq Computer Corporation Network switch with a multiple bus structure and a bridge interface for transferring network data between different buses
US5805801A (en) * 1997-01-09 1998-09-08 International Business Machines Corporation System and method for detecting and preventing security
US6026078A (en) 1997-02-05 2000-02-15 Nortel Networks Corporation Apparatus and method for providing multiple network port configurations
US6331983B1 (en) * 1997-05-06 2001-12-18 Enterasys Networks, Inc. Multicast switching
US6647018B1 (en) 1997-12-17 2003-11-11 Nokia Corporation Method for implementing ISDN user port status monitoring
US6084856A (en) * 1997-12-18 2000-07-04 Advanced Micro Devices, Inc. Method and apparatus for adjusting overflow buffers and flow control watermark levels
US6363081B1 (en) 1998-03-04 2002-03-26 Hewlett-Packard Company System and method for sharing a network port among multiple applications
US6839747B1 (en) * 1998-06-30 2005-01-04 Emc Corporation User interface for managing storage in a storage system coupled to a network
US6421342B1 (en) * 1998-07-02 2002-07-16 Pluris, Inc. Packet forwarding apparatus and method using pipelined node address processing
US6304973B1 (en) * 1998-08-06 2001-10-16 Cryptek Secure Communications, Llc Multi-level security network system
US6381218B1 (en) * 1998-09-11 2002-04-30 Compaq Computer Corporation Network controller system that uses directed heartbeat packets
US6229538B1 (en) 1998-09-11 2001-05-08 Compaq Computer Corporation Port-centric graphic representations of network controllers
US6438132B1 (en) * 1998-10-14 2002-08-20 Nortel Networks Limited Virtual port scheduler
US6421735B1 (en) 1998-10-30 2002-07-16 Advanced Micro Devices, Inc. Apparatus and method for automatically selecting a network port for a home network station
US7197044B1 (en) * 1999-03-17 2007-03-27 Broadcom Corporation Method for managing congestion in a network switch
US6952401B1 (en) * 1999-03-17 2005-10-04 Broadcom Corporation Method for load balancing in a network switch
US7145869B1 (en) * 1999-03-17 2006-12-05 Broadcom Corporation Method for avoiding out-of-ordering of frames in a network switch
US6993027B1 (en) * 1999-03-17 2006-01-31 Broadcom Corporation Method for sending a switch indicator to avoid out-of-ordering of frames in a network switch
US6453371B1 (en) 1999-04-23 2002-09-17 Palm, Inc. Method, apparatus, and system for selection of a port for data exchange
US6564261B1 (en) 1999-05-10 2003-05-13 Telefonaktiebolaget Lm Ericsson (Publ) Distributed system to intelligently establish sessions between anonymous users over various networks
US7031302B1 (en) * 1999-05-21 2006-04-18 Broadcom Corporation High-speed stats gathering in a network switch
US6907036B1 (en) * 1999-06-28 2005-06-14 Broadcom Corporation Network switch enhancements directed to processing of internal operations in the network switch
US7082133B1 (en) * 1999-09-03 2006-07-25 Broadcom Corporation Apparatus and method for enabling voice over IP support for a network switch
US20060209807A1 (en) * 1999-09-03 2006-09-21 Broadcom Corporation Apparatus and method for enabling voice over IP support for a network switch
US6519051B1 (en) * 2000-03-06 2003-02-11 Shinestar Llc Fax through data network and remote access network appliance control apparatus and method
US6741592B1 (en) 2000-05-22 2004-05-25 Cisco Technology, Inc. Private VLANs
US6766373B1 (en) 2000-05-31 2004-07-20 International Business Machines Corporation Dynamic, seamless switching of a network session from one connection route to another
US7031297B1 (en) * 2000-06-15 2006-04-18 Avaya Communication Israel Ltd. Policy enforcement switching
US7050431B2 (en) * 2000-11-14 2006-05-23 Broadcom Corporation Linked network switch configuration
US7424012B2 (en) * 2000-11-14 2008-09-09 Broadcom Corporation Linked network switch configuration
US7339938B2 (en) * 2000-11-14 2008-03-04 Broadcom Corporation Linked network switch configuration
US7035255B2 (en) * 2000-11-14 2006-04-25 Broadcom Corporation Linked network switch configuration
US7035286B2 (en) * 2000-11-14 2006-04-25 Broadcom Corporation Linked network switch configuration
US6850542B2 (en) * 2000-11-14 2005-02-01 Broadcom Corporation Linked network switch configuration
US7290283B2 (en) * 2001-01-31 2007-10-30 Lancope, Inc. Network port profiling
US7231430B2 (en) * 2001-04-20 2007-06-12 Egenera, Inc. Reconfigurable, virtual processing system, cluster, network and method
US7174390B2 (en) * 2001-04-20 2007-02-06 Egenera, Inc. Address resolution protocol system and method in a virtual network
US20060107108A1 (en) * 2001-04-20 2006-05-18 Egenera, Inc. Service clusters and method in a processing system with failover capability
US20020191589A1 (en) * 2001-04-27 2002-12-19 Dimitrios Vassiliou Method for synchronizing call signaling and voice circuit setup over a voice over internet protocol network
US6956824B2 (en) * 2001-06-14 2005-10-18 Tropic Networks Inc. Extension of link aggregation protocols over the network
US6810041B2 (en) 2001-07-13 2004-10-26 Adc Dsl Systems, Inc. Integrated access device
US20040243710A1 (en) * 2001-08-03 2004-12-02 Xiaolei Mao Method of user data exchange in the data network and a data network
US7469298B2 (en) * 2001-08-15 2008-12-23 Fujitsu Limited Method and system for enabling layer 2 transmission of IP data frame between user terminal and service provider
US7031327B2 (en) * 2001-08-24 2006-04-18 Permeo Technologies, Inc. Network application association
US20030206523A1 (en) * 2001-08-24 2003-11-06 Wei Lu Network application association
US7171504B2 (en) * 2001-10-03 2007-01-30 Fujitsu Limited Transmission unit
US20050232285A1 (en) * 2001-10-18 2005-10-20 Terrell William C System and method of providing network node services
US7447197B2 (en) * 2001-10-18 2008-11-04 Qlogic, Corporation System and method of providing network node services
US7216161B1 (en) * 2001-11-08 2007-05-08 Cisco Technology, Inc. Maintaining internet access while moving from port to port
US20030142674A1 (en) * 2002-01-30 2003-07-31 Nortel Networks Limited Label control method and apparatus for virtual private LAN segment networks
US6892309B2 (en) 2002-02-08 2005-05-10 Enterasys Networks, Inc. Controlling usage of network resources by a user at the user's entry point to a communications network based on an identity of the user
US20030227904A1 (en) * 2002-06-06 2003-12-11 Adc Telecommunications Israel Ltd. Associating virtual channel identifier to a user phone number at an access node in a VoATM telecommunication system
US20050232254A1 (en) * 2002-07-05 2005-10-20 Ulrich Korner Filter for traffic separation
US20040062257A1 (en) * 2002-09-30 2004-04-01 Intel Corporation System and method of maintaining coherent and synchronized address tables on all switches in a software stacking configuration
US7394756B1 (en) * 2003-03-17 2008-07-01 Sprint Communications Company L.P. Secure hidden route in a data network
US20040218539A1 (en) * 2003-03-26 2004-11-04 Usama Anqud Managing loops between network devices by monitoring MAC moves
US20050060414A1 (en) * 2003-04-15 2005-03-17 Sun Microsystems, Inc. Object-aware transport-layer network processing engine
US20040210663A1 (en) * 2003-04-15 2004-10-21 Paul Phillips Object-aware transport-layer network processing engine
US7460488B2 (en) * 2003-04-15 2008-12-02 Thomson Licensing Method and apparatus for router port configuration
US7516487B1 (en) * 2003-05-21 2009-04-07 Foundry Networks, Inc. System and method for source IP anti-spoofing security
US20050010811A1 (en) 2003-06-16 2005-01-13 Zimmer Vincent J. Method and system to support network port authentication from out-of-band firmware
US20040268140A1 (en) 2003-06-26 2004-12-30 Zimmer Vincent J. Method and system to support network port authentication from out-of-band firmware
US20050041596A1 (en) 2003-07-07 2005-02-24 Matsushita Electric Industrial Co., Ltd. Relay device and server, and port forward setting method
US7633948B2 (en) * 2003-07-07 2009-12-15 Panasonic Corporation Relay device and server, and port forward setting method
US6967949B2 (en) * 2003-09-15 2005-11-22 Teknovus, Inc. Method and apparatus for forwarding packets in an ethernet passive optical network
US20050058118A1 (en) 2003-09-15 2005-03-17 Davis Lawrence D. Method and apparatus for forwarding packets in an ethernet passive optical network
US20050091387A1 (en) * 2003-09-26 2005-04-28 Nec Corporation Network switch for logical isolation between user network and server unit management network and its operating method
US7380025B1 (en) * 2003-10-07 2008-05-27 Cisco Technology, Inc. Method and apparatus providing role-based configuration of a port of a network element
US20050078171A1 (en) * 2003-10-08 2005-04-14 Cisco Technology, Inc. A California Corporation System and method for performing distributed video conferencing
US20050169315A1 (en) * 2004-01-20 2005-08-04 Sbc Knowledge Ventures, L.P. System and method for accessing digital subscriber line data
US7310664B1 (en) * 2004-02-06 2007-12-18 Extreme Networks Unified, configurable, adaptive, network architecture
US20050190788A1 (en) * 2004-02-27 2005-09-01 Wong Yu-Man M. System and method for VLAN multiplexing
US7783735B1 (en) * 2004-03-22 2010-08-24 Mcafee, Inc. Containment of network communication
US20060182118A1 (en) * 2005-02-01 2006-08-17 Hong Kong Applied Science and Technology Research Institute Company Limited System And Method For Efficient Traffic Processing
US7747836B2 (en) * 2005-03-08 2010-06-29 Netapp, Inc. Integrated storage virtualization and switch system
US20060272014A1 (en) * 2005-05-26 2006-11-30 Mcrae Matthew B Gateway notification to client devices
US20070002899A1 (en) * 2005-06-30 2007-01-04 Anant Raman Methodology for network port security
US20070014290A1 (en) * 2005-07-12 2007-01-18 Cisco Technology, Inc. Address resolution mechanism for ethernet maintenance endpoints
EP1770913A1 (en) * 2005-09-29 2007-04-04 Alcatel Lucent System and method for port mapping in a communications network switch

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Alcatel: "Omniswitch 6800/6850/9000 release 6.1.3.R01" Release Notes, [Online] 2006, pp. 1-82, XP002418027 Retrieved from the Internet: URL:http://www.commswitch.be/files/613R01-revA.pdf.
Xlyan Corporation: "Omniswitch 3.2 Complete Switching Systems for the Next Generation of Computing" User Manual, [Online] May 15, 1998, pp. 1-71, XP002418026 Retrieved from teh Internet: URL:http://www.humboldt.edu/~it1/equipint/xylang/docs/Xylan-omniswitch-manual/xylan/CH32.pdf.
Xlyan Corporation: "Omniswitch 3.2 Complete Switching Systems for the Next Generation of Computing" User Manual, [Online] May 15, 1998, pp. 1-71, XP002418026 Retrieved from teh Internet: URL:http://www.humboldt.edu/˜it1/equipint/xylang/docs/Xylan-omniswitch-manual/xylan/CH32.pdf.

Also Published As

Publication number Publication date
US20090180471A1 (en) 2009-07-16

Similar Documents

Publication Publication Date Title
US8578441B2 (en) Enforcing network security policies with packet labels
US9118606B2 (en) Method and apparatus for simulating IP multinetting
US6167052A (en) Establishing connectivity in networks
US6741592B1 (en) Private VLANs
US7200145B1 (en) Private VLANs
US8718092B2 (en) Communication network system, network switch and bandwidth control, for site-to-site communications
Odi et al. The proposed roles of VLAN and inter-VLAN routing in effective distribution of network services in Ebonyi State University
CN100438477C (en) Filter for traffic separation
Aziz The importance of VLANs and trunk links in network communication areas
US7969966B2 (en) System and method for port mapping in a communications network switch
EP1770913A1 (en) System and method for port mapping in a communications network switch
TW591913B (en) Public access separation in a virtual networking environment
Cisco Configuring Interface Characteristics
EP4005180B1 (en) System resource management in self-healing networks
Cisco Configuring Interface Characteristics
Cisco Internetworking Design Basics
Cisco Configuring Transparent Bridging
Cisco Configuring VLANs
Cisco Internetworking Design Basics
Cisco Internetworking Design Basics
Cisco Internetworking Design Basics
Cisco Configuring VLANs
Cisco Configuring VLANs
CN106973016A (en) Access control method, device and equipment
Ahmad Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP

Legal Events

Date Code Title Description
AS Assignment

Owner name: ALCATEL, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BHORA, SUBASH;MAGRET, VINCENT;VALENTINE, STEVE;REEL/FRAME:017242/0465

Effective date: 20051214

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: ALCATEL LUCENT, FRANCE

Free format text: CHANGE OF NAME;ASSIGNOR:ALCATEL;REEL/FRAME:026154/0824

Effective date: 20061130

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: WSOU INVESTMENTS, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALCATEL LUCENT;REEL/FRAME:045085/0001

Effective date: 20171222

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20190628

AS Assignment

Owner name: OT WSOU TERRIER HOLDINGS, LLC, CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:WSOU INVESTMENTS, LLC;REEL/FRAME:056990/0081

Effective date: 20210528